Blog Archives

Lightboard Video: Managing Unstructured Data at Scale

Unstructured data as it scales from terabytes to petabytes creates a massive problem for organizations as they attempt to protect and manage that data. IT struggles with gaining visibility into the state of their unstructured data, which often requires multiple

Tagged with: , , , , , , , ,
Posted in Video

Is File Sync and Share OK for Endpoint Backup?

A surprising number of organizations and users consider their file sync and share (FSS) solution to be a suitable replacement for backup. With an FSS solution if a user accidentally deletes a file the FSS service can provide the user

Tagged with: , , , , , , , , , ,
Posted in Blog

Dashboarding Diverse Storage Infrastructures

The previous blog in this series outlined the advantages of a diverse storage infrastructure; flexibility, workload specific performance, and hard-cost savings. The challenge with a diverse storage infrastructure is how to manage it. In prior blogs, we’ve looked at several

Tagged with: , , , , , , , , , ,
Posted in Blog

Protecting Against Departing Users

One of the top ways that data “leaks” out of an organization is through the endpoints (laptops, tablets, and smartphones) of departing users. IT should, of course, do what it can to prevent data leakage, but it also should make

Tagged with: , , , , , , , , ,
Posted in Blog

Embracing the Cloud for More Effective Endpoint Disaster Recovery

In a world where enterprise mobility and cyber-attacks are simultaneously booming, protecting endpoints has become crucial to business longevity. Laptops are the primary target for malware such as ransomware. Also, these devices are prone to being lost or stolen –

Tagged with: , , , , , , , , ,
Posted in Blog

Lightboard Video: Overcoming IO Bottlenecks in HPC

Parallel file systems are a critical aspect of most Super Computing environments. One of the challenges facing parallel file systems is making sure the file system itself does not become a bottleneck. If not architected correctly, IO can overwhelm the

Tagged with: , , , , , , , ,
Posted in Video

The Impact of Application Sprawl on Protection Service Levels

In our on demand webinar “Application Explosion – Rediscovering the Lost Art of Service Levels” we discuss how IT can successfully continue to set service levels in environments where the number of applications they need to support is growing every

Tagged with: , , , , , , , , , ,
Posted in Blog

Is the Ransomware Scare Over?

In 2017, Ransomware attacks like WannaCry and Locky made headlines as organizations worldwide were infected. Data protection vendors of all types went to work hardening their solutions and advancing them to help customers recover from the threat. However, ransomware attacks

Tagged with: , , , , , , , , ,
Posted in Blog